Sciweavers

2266 search results - page 403 / 454
» Some Solutions to the Ignoring Problem
Sort
View
130
Voted
ACSAC
2000
IEEE
15 years 9 months ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao
PLDI
1994
ACM
15 years 8 months ago
Memory Access Coalescing: A technique for Eliminating Redundant memory Accesses
As microprocessor speeds increase, memory bandwidth is increasing y the performance bottleneck for microprocessors. This has occurred because innovation and technological improvem...
Jack W. Davidson, Sanjay Jinturkar
RT
2000
Springer
15 years 8 months ago
Fast Global Illumination Including Specular Effects
Rapidly simulating global illumination, including diffuse and glossy light transport is a very difficult problem. Finite element or radiosity approaches can achieve interactive si...
Xavier Granier, George Drettakis, Bruce Walter
CONEXT
2005
ACM
15 years 6 months ago
Hybrid reliable multicast with TCP-XM
In recent years, much work has been done on attempting to scale multicast data transmission to hundreds or thousands of receivers. There are, however, many situations where an app...
Karl Jeacle, Jon Crowcroft, Marinho P. Barcellos, ...
136
Voted
INFORMATIKTAGE
2008
15 years 6 months ago
Constraint Based Transformation Theory
During the last 25 years the complexity and functionality of software systems has increased dramatically. Software systems have to be updated and restructured continuously [22]. I...
Stefan Natelberg